TW202001582A - Method of device identification and server with function of device identification - Google Patents
Method of device identification and server with function of device identification Download PDFInfo
- Publication number
- TW202001582A TW202001582A TW107119783A TW107119783A TW202001582A TW 202001582 A TW202001582 A TW 202001582A TW 107119783 A TW107119783 A TW 107119783A TW 107119783 A TW107119783 A TW 107119783A TW 202001582 A TW202001582 A TW 202001582A
- Authority
- TW
- Taiwan
- Prior art keywords
- server
- external device
- information
- external
- white list
- Prior art date
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
本發明係關於一種裝置辨識方法及具有裝置辨識功能的伺服器,特別是一種應用黑白名單的裝置辨識方法及具有裝置辨識功能的伺服器。The invention relates to a device identification method and a server with a device identification function, in particular to a device identification method using a black and white list and a server with a device identification function.
市面上的伺服器設備通常會與其他的周邊裝置結合使用,常見的周邊裝置可以例如是USB介面的鍵盤、滑鼠或是隨身碟等。為了因應該類型的周邊裝置被插接至伺服器設備或從伺服器設備移除,對應的運作往往需要預先設定於伺服器設備當中,並無法動態地改變。另外,亦無法針對於未知的周邊裝置進行擴充支援。Server devices on the market are usually used in combination with other peripheral devices. Common peripheral devices may be, for example, a USB interface keyboard, a mouse, or a flash drive. In order to be plugged into or removed from the server device according to the type of peripheral device, the corresponding operation often needs to be preset in the server device and cannot be dynamically changed. In addition, it cannot expand support for unknown peripheral devices.
再者,對於同頪型之周邊裝置,伺服器設備無法在接入時辨別其廠牌/型號,亦無法對其進行初始化以及功能測試等。由於伺服器設備無法經過檢測就直接使用周邊裝置,因此若是插入的裝置不明或異常,恐會對伺服器設備之安全性造成危害。In addition, for peripheral devices of the same type, the server device cannot identify the brand/model when it is connected, nor can it initialize or perform function tests. Because the server device cannot directly use the peripheral device without detection, if the inserted device is unknown or abnormal, it may cause harm to the security of the server device.
本發明提出一種裝置辨識方法及具有裝置辨識功能的伺服器,兼具內部裝置的自我檢測功能及週邊裝置的外部檢測功能。藉此,可以確認所裝設的內/外部裝置是否為合法裝置,以提升伺服器的運作安全性。The invention provides a device identification method and a server with a device identification function, which has both a self-detection function for internal devices and an external detection function for peripheral devices. In this way, it can be confirmed whether the installed internal/external devices are legitimate devices, so as to improve the operational safety of the server.
依據本發明之一實施例揭露一種裝置辨識方法,包含以下步驟:啟動伺服器以執行伺服器內的應用程式;當執行應用程式時,以伺服器內的事件系統偵測是否有外接裝置插接至伺服器的裝置連接埠;當事件系統偵測到有外接裝置插接至伺服器的裝置連接埠時,以伺服器內的裝置檔案系統擷取外接裝置的資訊;依據伺服器內存的黑白名單比對外接裝置的資訊,以判斷外接裝置是否為合法裝置;當判斷外接裝置係為合法裝置時,以伺服器執行關聯於外接裝置的裝置應用程式。於一實施例中,所述方法更包含在執行該應用程式後,執行自我檢測程序,用於檢測伺服器內的主板上的多個硬體裝置,如同於外接裝置插接後之行為,檢測該些硬體裝置的資訊是否符合硬體清單的預設內容,以選擇性地啟用該些硬體裝置。According to an embodiment of the present invention, a device identification method is disclosed, which includes the following steps: starting a server to execute an application program in the server; when executing an application program, the event system in the server detects whether an external device is plugged in Device port to the server; when the event system detects that an external device is plugged into the device port of the server, the device file system in the server is used to retrieve the information of the external device; based on the black and white list of the server memory The information of the external device is compared to determine whether the external device is a legal device; when it is determined that the external device is a legal device, the server executes the device application program associated with the external device. In one embodiment, the method further includes performing a self-test procedure after executing the application program, for detecting multiple hardware devices on the motherboard in the server, just like the behavior after the external device is plugged in. Whether the information of the hardware devices meets the default content of the hardware list to selectively activate the hardware devices.
依據本發明之一實施例揭露一種具有裝置辨識功能的伺服器,包含主板、裝置連接埠、第一儲存區、第二儲存區及第三儲存區。所述的第一儲存區、第二儲存區及第三儲存區位於主板上,裝置連接埠電性連接主板且用以供外接裝置可插拔地連接。第一儲存區用以儲存應用程式以及關聯於內/外接裝置的裝置應用程式。第二儲存區用以儲存黑白名單及硬體清單。第三儲存區儲存事件系統及裝置檔案系統。事件系統用以當應用程式被執行時,偵測是否有外接裝置插接至伺服器的裝置連接埠。裝置檔案系統用以當偵測有外接裝置插接至伺服器的裝置連接埠時,擷取外接裝置的資訊。其中伺服器依據黑白名單對照外接裝置的資訊,判斷外接裝置是否為合法裝置,且當判斷外接裝置係為合法裝置時,伺服器執行關聯於外接裝置的裝置應用程式。於一實施例中,在執行該應用程式後,伺服器更執行自我檢測程序,用於檢測主板上的多個硬體裝置,如同於外接裝置插接後之行為,伺服器依據該些硬體裝置的資訊查詢第二儲存區的硬體清單的內容,以選擇性地啟用該些硬體裝置。According to one embodiment of the present invention, a server with a device identification function is disclosed, including a motherboard, a device port, a first storage area, a second storage area, and a third storage area. The first storage area, the second storage area, and the third storage area are located on the motherboard, and the device connection port is electrically connected to the motherboard and is used for pluggable connection of an external device. The first storage area is used to store application programs and device application programs associated with internal/external devices. The second storage area is used to store black and white lists and hardware lists. The third storage area stores the event system and the device file system. The event system is used to detect whether an external device is plugged into the device port of the server when the application is executed. The device file system is used to retrieve the information of the external device when it detects that the external device is plugged into the device port of the server. The server compares the information of the external device based on the black and white list to determine whether the external device is a legal device, and when the external device is determined to be a legal device, the server executes the device application program associated with the external device. In one embodiment, after executing the application program, the server further executes a self-detection process for detecting multiple hardware devices on the motherboard, just like the behavior after the external device is plugged in. The server depends on the hardware The device information queries the contents of the hardware list in the second storage area to selectively activate the hardware devices.
綜上所述,於本發明提出的裝置辨識方法及具有裝置辨識功能的伺服器中,先藉由自我檢測程序以確認內部裝置是否啟用,另外再偵測外接裝置且擷取外接裝置的廠牌/型號等相關資訊,與預存的黑白名單進行比對,以判定所插接的周邊裝置是否為合法裝置,從而決定是否執行對應的裝置應用程式。本發明提出的裝置辨識方法及具有裝置辨識功能的伺服器兼具有內部裝置及外部週邊裝置的檢測功能。藉此,可以確認所裝設的內/外部裝置是否為合法裝置,以提升伺服器的運作安全性。In summary, in the device identification method and the server with the device identification function proposed by the present invention, the self-detection process is used to confirm whether the internal device is activated, and then the external device is detected and the brand of the external device is retrieved /Model and other related information are compared with the pre-stored black and white list to determine whether the plugged-in peripheral device is a legal device, and then decide whether to execute the corresponding device application program. The device identification method and the server with the device identification function proposed by the present invention also have the detection functions of the internal device and the external peripheral device. In this way, it can be confirmed whether the installed internal/external devices are legitimate devices, so as to improve the operational safety of the server.
以上之關於本揭露內容之說明及以下之實施方式之說明係用以示範與解釋本發明之精神與原理,並且提供本發明之專利申請範圍更進一步之解釋。The above description of the disclosure and the following description of the embodiments are used to demonstrate and explain the spirit and principle of the present invention, and provide a further explanation of the scope of the patent application of the present invention.
以下在實施方式中詳細敘述本發明之詳細特徵以及優點,其內容足以使任何熟習相關技藝者了解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。以下之實施例係進一步詳細說明本發明之觀點,但非以任何觀點限制本發明之範疇。The following describes in detail the detailed features and advantages of the present invention in the embodiments. The content is sufficient for any person skilled in the relevant art to understand and implement the technical content of the present invention, and according to the contents disclosed in this specification, the scope of patent application and the drawings Anyone skilled in the relevant art can easily understand the purpose and advantages of the present invention. The following examples further illustrate the views of the present invention in detail, but do not limit the scope of the present invention in any way.
請參照圖1,圖1係依據本發明之一實施例所繪示的具有裝置辨識功能的伺服器的功能方塊圖。如圖1所示,伺服器1包含主板10、裝置連接埠11、第一儲存區12、第二儲存區13及第三儲存區14。所述的第一儲存區12、第二儲存區13及第三儲存區14係位於主板10上,於一實施例中,除了前述的儲存區之外,主板10更設有多個硬體裝置101~103。主板10例如是一般伺服器內的主電路板,而硬體裝置101~103例如分別是顯示卡、音效卡、網路卡等伺服器內部的硬體元件,本發明不以此為限。Please refer to FIG. 1. FIG. 1 is a functional block diagram of a server with a device identification function according to an embodiment of the present invention. As shown in FIG. 1, the server 1 includes a
裝置連接埠11電性連接主板10且用以供外接裝置2可插拔地連接。於實務上,裝置連接埠11可以係為一般常見的USB介面連接埠,用於提供給週邊裝置進行插拔。而第一儲存區12用以儲存應用程式AP及關聯於內/外接裝置的裝置應用程式DP(即為“Device Process”)。第二儲存區13用以儲存黑白名單BL及/或硬體清單HL。第三儲存區14用以儲存事件系統ES(即為“Event System”)及裝置檔案系統DS(即為“Device File System”)。於一個實作的例子中,第一儲存區12與第二儲存區13係由單一個儲存記憶體(例如硬碟)所具有的儲存空間分割而成,第三儲存區14則為裝置接入時映射出的虛擬記憶體空間,作用於與裝置資料傳遞之接口。於另一個實作的例子中,第一儲存區12、第二儲存區13係為不同的儲存記憶體(例如雲端儲存空間)所各別具有的儲存空間。而於一實施例中,前述的黑白名單BL與硬體清單HL可整合為單一的系統黑白名單供伺服器1查詢。The
於一實施例中,當初始啟動伺服器1時,伺服器1會先執行第一儲存區12內的應用程式AP,以啟動一個自我檢測程序,用於檢測主板10上的硬體裝置101~103。具體來說,伺服器1是藉由執行所述的自我檢測程序,以確認主板10上所裝設的硬體裝置101~103是否為所欲安裝的裝置。於實際運作上,若是伺服器1確認硬體裝置101~103其中任一係為所欲安裝的裝置,便將其啟用。反之,若是伺服器1確認硬體裝置101~103其中任一不是所欲安裝的裝置,便會禁用該硬體裝置。藉由執行自我檢測程序,伺服器1便可以確認要啟用主板10上的哪些硬體裝置且要禁用哪些硬體裝置。於一個實際的例子中,所述的自我檢測程序包含檢測硬體裝置101~103的資訊是否符合硬體清單HL的預設內容,以選擇性地啟用硬體裝置101~103。In an embodiment, when the server 1 is initially started, the server 1 will first execute the application AP in the
具體來說,在自我檢測程序中,伺服器1的處理器首先從第三儲存區14內的裝置檔案系統DS找出主板10上所裝設的硬體裝置101~103,並比對第二儲存區13內硬體清單HL的預設內容,所述的預設內容可包含所屬伺服器認可的硬體裝置的廠牌及/或型號。伺服器1逐一檢查每個硬體裝置101~103,若硬體裝置101~103當中任一硬體裝置的廠牌及/或型號不屬於硬體清單HL所包含的硬體裝置的廠牌及/或型號,則伺服器1會將該硬體裝置辨識為不合法之硬體裝置且進一步地禁用該硬體裝置。反之,若硬體裝置101~103當中任一硬體裝置的廠牌及/或型號係屬於硬體清單HL所包含的硬體裝置的廠牌及/或型號,則伺服器1會將該硬體裝置辨識為合法之硬體裝置且進一步地執行關於該硬體裝置的裝置應用程式以啟用該硬體裝置。Specifically, in the self-test procedure, the processor of the server 1 first finds the hardware devices 101-103 installed on the
換言之,此實施例係通過裝置檔案系統DS掃描以找出已連接伺服器之各個硬體裝置,為其建立並記錄一些可得到相關於該些硬體裝置的資訊,以便於管理硬體裝置的使用情況。必要時也可將其記錄上傳至雲端,延伸保固相關之用。伺服器1可以確保開機時僅啟用內部某些可信任的硬體裝置,而對於不明的硬體裝置則予以禁用,藉此提升伺服器運作的安全性。In other words, this embodiment scans through the device file system DS to find each hardware device connected to the server, and creates and records some information related to the hardware devices to facilitate management of the hardware device. Usage. If necessary, its records can also be uploaded to the cloud for extended warranty-related use. The server 1 can ensure that only certain trusted hardware devices are enabled when it is turned on, and it is disabled for unknown hardware devices, thereby improving the security of the server operation.
請再次參閱圖1,於另一實施例中,事件系統ES用以於應用程式AP被執行時,偵測是否有外接裝置2插接至伺服器1的裝置連接埠11。而裝置檔案系統DS用以於偵測有外接裝置2插接至伺服器1的裝置連接埠11時,擷取外接裝置2的資訊。具體來說,當執行完前述的自我檢測裝置後,伺服器1內部主板10上的合法硬體裝置便可開始運作,以執行伺服器的基本運行功能。接著,在應用程式AP常駐的背景之下,伺服器1內的處理器會讀取第三儲存區14的事件系統ES與裝置檔案系統DS以執行外接裝置2的插接偵測與外接裝置2的資料擷取的任務。於此實施例中,所述的外接裝置2係為USB隨身碟。於其他實施例中,外接裝置2可以係為鍵盤、滑鼠等電腦週邊裝置。Please refer to FIG. 1 again. In another embodiment, the event system ES is used to detect whether an external device 2 is plugged into the
以一個實際應用例子來說明上述內容,如圖1所示,在執行應用程式AP的情形下,當外接裝置2(例如USB隨身碟)被插接至裝置連接埠11時,事件系統ES會先偵測到裝置連接埠11受到外接裝置2插接的動作,應用程式AP依據事件系統ES所偵測到的事件對裝置檔案系統DS擷取外接裝置2的相關資訊,其中所述的相關資訊可例如是外接裝置2的製造廠牌/型號。接著,伺服器1依據黑白名單BL對照所擷取到的外接裝置2的資訊,以判斷外接裝置2是否為合法裝置。以一實施例中,伺服器1用以當黑白名單BL內的所述的多個白名單項目其中之一符合外接裝置2的資訊時,判斷外接裝置2為合法裝置。To illustrate the above with a practical application example, as shown in FIG. 1, in the case of executing the application AP, when an external device 2 (such as a USB flash drive) is plugged into the
詳細來說,伺服器1內的處理器從第二儲存區13讀取黑白名單BL,黑白名單BL包含有多個白名單項目,例如可判定為合法裝置的製造廠牌/型號。當所擷取到的外接裝置2的製造廠牌/型號係符合白名單項目其中之一,伺服器1便認定外接裝置2係為合法裝置。當伺服器1判斷外接裝置2係為合法裝置時,伺服器1便執行關聯於外接裝置2的裝置應用程式DP。於實務上,所述的裝置應用程式DP可包含外接裝置2的初始化、功能測試、故障排除和日誌等。換言之,透過所述應用程式AP常駐下,當週邊的外接裝置與伺服器1結合時,伺服器1可取得插接的外接裝置的相關資訊,進一步地透過黑白名單BL確認所插接的外接裝置是否合法,以作為是否執行該外接裝置的應用程式的依據。如此,可解決一般傳統伺服器未經檢測就直接使用週邊裝置所產生的風險,提升整體伺服器的安全性。In detail, the processor in the server 1 reads the black and white list BL from the
請參照圖2,圖2係依據本發明之一實施例所繪示的裝置辨識方法的方法流程圖。所述的裝置辨識方法可應用於前述圖1實施例的伺服器1。如圖2所示,於步驟S201中,啟動伺服器1,且於步驟S202中,伺服器1的處理器執行伺服器1內的應用程式AP。於步驟S203中,當執行應用程式AP時,以伺服器1內的事件系統ES(即為“Event System”)偵測是否有外接裝置2插接至伺服器1的裝置連接埠11。當事件系統ES偵測到有外接裝置2插接至伺服器1的裝置連接埠11時,則於步驟S204中,以伺服器1內的裝置檔案系統DS(即為“Device File System”)擷取外接裝置2的資訊。於步驟S205中,依據伺服器1內存的黑白名單BL比對外接裝置的資訊,以判斷外接裝置2是否為合法裝置。當判斷外接裝置2係為合法裝置時,則於步驟S206中,以伺服器1執行關聯於外接裝置2的裝置應用程式。Please refer to FIG. 2, which is a flowchart of a method for identifying a device according to an embodiment of the invention. The device identification method described above can be applied to the server 1 of the aforementioned embodiment of FIG. 1. As shown in FIG. 2, in step S201, the server 1 is started, and in step S202, the processor of the server 1 executes the application program AP in the server 1. In step S203, when the application program AP is executed, an event system ES (ie, "Event System") in the server 1 is used to detect whether an external device 2 is plugged into the
於一實施例中,如圖2所示,在啟動伺服器1後且執行伺服器1內的應用程式AP後,於步驟S202a中,更執行一自我檢測程序,用於檢測伺服器1內的主板10上的多個硬體裝置101~103。於此實施例中,所述的自我檢測程序包含檢測所述硬體裝置101~103的資訊是否符合硬體清單HL的預設內容,以選擇性地啟用該些硬體裝置101~103。硬體清單HL的預設內容包含伺服器1所認可的硬體裝置的廠牌及/或型號。換言之,僅有硬體清單HL所含的硬體裝置的廠牌及/或型號才會被伺服器1所啟用。以實際例子來說,假設硬體裝置101係為A家廠商所產出的硬體裝置,而硬體清單HL並未包含該A家廠商的廠牌。此時,伺服器1便判定硬體裝置101(即A家廠牌)不適用而禁用硬體裝置101。在實作上,伺服器的設計廠商可將伺服器設定成適用某特定幾家廠牌或型號的硬體裝置,藉此可避免自家生產的伺服器與不明廠牌/型號的硬體裝置組合,而導致本身伺服器運行異常。In an embodiment, as shown in FIG. 2, after the server 1 is started and the application AP in the server 1 is executed, in step S202a, a self-detection process is further performed to detect the Multiple hardware devices 101-103 on the
於一實施例中,依據伺服器1內存的黑白名單BL比對外接裝置2的資訊,以判斷外接裝置2是否為合法裝置的步驟包含以下子步驟I~III。於子步驟I中,對照黑白名單BL所包含的多個白名單項目與外接裝置2的資訊。於子步驟II中,當外接裝置2的資訊符合該些白名單項目其中之一時,判斷該外接裝置2為合法裝置。於子步驟III中,當外接裝置2的資訊不符合該些白名單項目任一者時,判斷外接裝置2為不合法裝置。關於伺服器1針對內部硬體裝置101~103及外接裝置2的檢測已於前述段落有詳細說明,在此不予贅述。In one embodiment, the step of comparing the information of the external device 2 according to the black and white list BL in the server 1 to determine whether the external device 2 is a legitimate device includes the following sub-steps I to III. In sub-step I, the white list items included in the black and white list BL are compared with the information of the external device 2. In sub-step II, when the information of the external device 2 matches one of the white list items, it is determined that the external device 2 is a legitimate device. In sub-step III, when the information of the external device 2 does not match any of the white list items, it is determined that the external device 2 is an illegal device. The detection of the
綜上所述,於本發明提出的裝置辨識方法及具有裝置辨識功能的伺服器中,在應用程式常駐的背景之下,可透過自我檢測程序以確認要啟用哪些內部裝置,亦可偵測週邊的外接裝置的插接且進一步擷取外接裝置的廠牌/型號等相關資訊,與預存的黑白名單進行比對,據以判定所插接的周邊裝置是否為合法裝置,從而決定是否執行對應的裝置應用程式。總結來說,本發明提出的裝置辨識方法及具有裝置辨識功能的伺服器係兼具有內部裝置的自我檢測功能及外部週邊裝置的檢測功能。藉此,可以確認所裝設的內/外部裝置是否為合法裝置,以提升伺服器的運作安全性。In summary, in the device identification method and the server with device identification function proposed by the present invention, in the context of the permanent application, the self-detection process can be used to confirm which internal devices are to be activated and can also detect the surrounding Plug in the external device and further retrieve the relevant information such as the make/model of the external device, and compare it with the pre-stored black and white list to determine whether the connected peripheral device is a legal device, so as to decide whether to execute the corresponding Device application. In summary, the device identification method and the server with the device identification function proposed by the present invention have both the self-detection function of the internal device and the detection function of the external peripheral device. In this way, it can be confirmed whether the installed internal/external devices are legitimate devices, so as to improve the operational safety of the server.
雖然本發明以前述之實施例揭露如上,然其並非用以限定本發明。在不脫離本發明之精神和範圍內,所為之更動與潤飾,均屬本發明之專利保護範圍。關於本發明所界定之保護範圍請參考所附之申請專利範圍。Although the present invention is disclosed as the foregoing embodiments, it is not intended to limit the present invention. Without departing from the spirit and scope of the present invention, all modifications and retouching are within the scope of patent protection of the present invention. For the protection scope defined by the present invention, please refer to the attached patent application scope.
1‧‧‧伺服器10‧‧‧主板101~103‧‧‧硬體裝置11‧‧‧裝置連接埠12‧‧‧第一儲存區13‧‧‧第二儲存區14‧‧‧第三儲存區2‧‧‧外接裝置AP‧‧‧應用程式DP‧‧‧裝置應用程式BL‧‧‧黑白名單HL‧‧‧硬體清單ES‧‧‧事件系統DS‧‧‧裝置檔案系統1‧‧‧
圖1係依據本發明之一實施例所繪示的具有裝置辨識功能的伺服器的功能方塊圖。 圖2係依據本發明之一實施例所繪示的裝置辨識方法的方法流程圖。FIG. 1 is a functional block diagram of a server with device identification function according to an embodiment of the invention. FIG. 2 is a method flowchart of a device identification method according to an embodiment of the invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW107119783A TW202001582A (en) | 2018-06-08 | 2018-06-08 | Method of device identification and server with function of device identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW107119783A TW202001582A (en) | 2018-06-08 | 2018-06-08 | Method of device identification and server with function of device identification |
Publications (1)
Publication Number | Publication Date |
---|---|
TW202001582A true TW202001582A (en) | 2020-01-01 |
Family
ID=69941998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW107119783A TW202001582A (en) | 2018-06-08 | 2018-06-08 | Method of device identification and server with function of device identification |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW202001582A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI731821B (en) * | 2020-10-28 | 2021-06-21 | 財團法人工業技術研究院 | Method and system for establishing application whitelisting |
-
2018
- 2018-06-08 TW TW107119783A patent/TW202001582A/en unknown
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI731821B (en) * | 2020-10-28 | 2021-06-21 | 財團法人工業技術研究院 | Method and system for establishing application whitelisting |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8364974B2 (en) | Pre-boot firmware based virus scanner | |
US9516056B2 (en) | Detecting a malware process | |
US9262631B2 (en) | Embedded device and control method thereof | |
US10817211B2 (en) | Method for completing a secure erase operation | |
JP2007012032A (en) | Usb-compliant personal key | |
US11601443B2 (en) | System and method for generating and storing forensics-specific metadata | |
US7660412B1 (en) | Generation of debug information for debugging a network security appliance | |
EP3029564B1 (en) | System and method for providing access to original routines of boot drivers | |
CN107766734A (en) | Clean boot RAID card method, apparatus, equipment and computer-readable recording medium | |
WO2019037521A1 (en) | Security detection method, device, system, and server | |
US20110047305A1 (en) | Apparatus and method for securing data of usb devices | |
TW202001582A (en) | Method of device identification and server with function of device identification | |
CN111428240B (en) | Method and device for detecting illegal access of memory of software | |
US12001556B2 (en) | Anti-virus chip and anti-virus method | |
US11144217B2 (en) | Data protection method and associated storage device | |
JP7404223B2 (en) | System and method for preventing unauthorized memory dump modification | |
CN106775941A (en) | A kind of virtual machine kernel completeness protection method and device | |
CN110580176A (en) | Device identification method and server with device identification function | |
CH716699B1 (en) | Method to thwart the removal of digital forensic science information by malicious software. | |
CN101539975B (en) | System and method using wide area network connection for protecting assets | |
US20210240364A1 (en) | Storing new settings for write-protected systems on non-write-protected storage | |
CN103927492B (en) | A kind of data processing equipment and data guard method | |
US12008109B2 (en) | Cloud based boot integrity | |
CN113378245B (en) | Operation and maintenance method and device for security state data, electronic equipment and storage medium | |
US20090222635A1 (en) | System and Method to Use Chipset Resources to Clear Sensitive Data from Computer System Memory |